Security Automation May 26th, 2010. Security Automation: the challenge “Tower of Babel” – Too much proprietary, incompatible information – Costly – Error.

Slides:



Advertisements
Similar presentations
Trusted Computing in Government Networks May 16, 2007 Richard C. (Dick) Schaeffer, Jr. Information Assurance Director National Security Agency.
Advertisements

IMPLEMENTING FINANCIAL AND ACCOUNTING SYSTEMS FOR GOVERNMENT CHRISTIAN T. SOTTIE THE CONTROLLER AND ACCOUNTANT-GENERAL GHANA.
METRICS AND CONTROLS FOR DEFENSE IN DEPTH AN INFORMATION TECHNOLOGY SECURITY ASSESSMENT INITIATIVE.
Federal Desktop Core Configuration and the Security Content Automation Protocol Peter Mell, National Vulnerability Database National Institute of Standards.
Federal Risk and Authorization Management Program (FedRAMP) Lisa Carnahan, Computer Scientist National Institute of Standards & Technology Standards Coordination.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Bill McClanahan – Principal Business Consultant LPS Integration.
Delivering Mission Agility Through Agile SOA Governance 13 th SOA e-Government Conference 4/12/2012 Presented by Wolf Tombe Chief Technology Officer (CTO)
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Paul Green –President and Founder of G2, Inc –We are trusted security advisors to the Federal Government and Fortune 500. –We are recognized as having.
Cyber Security: Past and Future John M. Gilligan CERT’s 20 th Anniversary Technical Symposium Pittsburgh, PA March 10, 2009.
SACM Terminology Nancy Cam-Winget, David Waltermire, March.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
TRAC / TDR ICPSR Trustworthy Digital Repositories.
Use of Oregon Statewide Electronic Records Management Systems (ERMS) Price & Services Agreements (PSA) DAS SPO Representative Lena Ferris DAS EISPD Representatives.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Security Controls – What Works
NSA/DISA/NIST Security Content Automation Program Vulnerability Compliance & Measurement Stephen Quinn & Peter Mell Computer Security Division NIST.
The State of Security Management By Jim Reavis January 2003.
Inteco and NIST Cooperation Peter Mell National Vulnerability Database Project Lead Senior Computer Scientist NIST Computer Security Division Tim Grance.
© 2006 IBM Corporation IBM Software Group Relevance of Service Orientated Architecture to an Academic Infrastructure Gareth Greenwood, e-learning Evangelist,
1 DCS860A Emerging Technology Physical layer transparency in Cloud Computing (rev )
DUNSRight and XBRL – Enhancing Transparency through a Common Commitment to Global Standards 13 th XBRL International Congress June, 2006 CONFIDENTIAL &
Lean Operations for Water and Wasterwater Controlling Cost While Improving Efficiency… A Real World View.
(Geneva, Switzerland, September 2014)
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
Supplement 02CASE Tools1 Supplement 02 - Case Tools And Franchise Colleges By MANSHA NAWAZ.
Overview 4Core Technology Group, Inc. is a woman/ veteran owned full-service IT and Cyber Security firm based in Historic Petersburg, Virginia. Founded.
Cloud Usability Framework
National Information Assurance Partnership NIAP 2000 Building More Secure Systems for the New Millenium sm.
Governance, Risk, and Compliance Bill Greene Senior Industry Director.
© 2011 The MITRE Corporation. All rights Reserved. Approved for Public Release: Distribution Unlimited You’re Not Done (Yet) Turning Securable.
Cloud Computing in Large Scale Projects George Bourmas Sales Consulting Manager Database & Options.
Security and Privacy Services Cloud computing point of view October 2012.
A Model for Exchanging Vulnerability Information draft-booth-sacm-vuln-model-01 David Waltermire.
JDF in the Inter-Enterprise Workflow Achieving JDF workflow automation.
PROJECT NAME: DHS Watch List Integration (WLI) Information Sharing Environment (ISE) MANAGER: Michael Borden PHONE: (703) extension 105.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
Automating STIGs: The Transition to CCI and SRG
Introduction to IT Governance Support System (ITGSS)
Automating Enterprise IT Management by Leveraging Security Content Automation Protocol (SCAP) John M. Gilligan May, 2009.
Promoting Web Services Interoperability Across Platforms, Applications and Programming Languages Basic Profile 1.0 August 12, 2003 Copyright © 2003 by.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
2009 Federal IT Summit Cloud Computing Breakout October 28, 2009.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Enterprise Architecture, Enterprise Data Management, and Data Standardization Efforts at the U.S. Department of Education May 2006 Joe Rose, Chief Architect.
Synergy of the SCAP Program and IETF Activities BOF
Auditing IT Vulnerabilities IT vulnerabilities are weaknesses or exposures in IT assets or processes that may lead to a business risk or security risk.
The information supply chain FDIC XBRL International Conference Mr. Inscoe.
Massachusetts Open Standards Policy Claudia Boldman Director of Policy and Architecture Information Technology Division, MA.
March 2004 At A Glance NASA’s GSFC GMSEC architecture provides a scalable, extensible ground and flight system approach for future missions. Benefits Simplifies.
NIST HIPAA Security Rule Toolkit Kevin Stine Computer Security Division Information Technology Laboratory National Institute of Standards and Technology.
March 2004 At A Glance The AutoFDS provides a web- based interface to acquire, generate, and distribute products, using the GMSEC Reference Architecture.
Accurate  Consistent  Compliant Contact: i4i the structured content company the structured content company.
ITU-T CYBEX standards for cybersecurity information dissemination and exchange Youki Kadobayashi, Ph.D. NICT Japan / Rapporteur, ITU-T SG17 Q.4 ITU-T SG17.
Agenda Enterprise Situational Awareness Active Defense
Accenture Proprietary, All Rights Reserved, Not for Distribution
Introduction to the Federal Defense Acquisition Regulation
Detection and Analysis of Threats to the Energy Sector (DATES)
Governance, Risk, and Compliance Bill Greene Senior Industry Director
Security Automation Standards Landscape
I have many checklists: how do I get started with cyber security?
Azure AD Deployment Are you maximising your Azure AD investment?
Chapter 1 Database Systems
Life Cycle Part & Component Knowledge Sharing Portal
Compliance Toolbox.
CVE.
Chapter 1 Database Systems
Presentation transcript:

Security Automation May 26th, 2010

Security Automation: the challenge “Tower of Babel” – Too much proprietary, incompatible information – Costly – Error prone – Difficult to scale Inefficient – Resources spent on “security hygiene” Vulnerability management Configuration management Patch management Compliance management 2 Web Sites Guidance Documents Assessment Tools Management Tools Alerts & Advisories Reporting Tools

Security Automation: the solution Standardization: – Same Object, Same Name – Reporting Automation: – Efficiency – Accuracy – Resources re-tasked to harder problems: Incident response Infrastructure enhancement 3 Web Sites Assessment Tools Management Tools Alerts & Advisories Reporting Tools Guidance Documents

What are we achieving with Security Automation? Minimize Effort Reducing the time and effort of manual assessment and remediation Providing a more comprehensive assessment of system state Increase Standardization and Interoperability Enabling fast and accurate correlation within the enterprise and across organizations/agencies; Reporting Shortening decision cycles by rapidly communicating: Requirements (What/How to check) Results (What was found) Allowing diverse tool suites and repositories to share data Fostering shared situational awareness by enabling and facilitating data sharing, analysis, and aggregation

What are we achieving with Security Automation and Standardization? Standard data, economy of scale, and reuse Standardized security content can be developed once and used by many Common definitions for vulnerabilities, software, and policy statements Speed Rapidly identify vulnerabilities and improperly configured systems and communicate the degree of associated risk Zero day malware detection

Security Content Automation Protocol (SCAP) SCAP is a suite of specifications that together enable standardization and automation of vulnerability management, measurement, and technical policy compliance checking along with enhanced product and database integration capabilities with machine readable reporting. In other words, “the plumbing”

Security Content Automation Protocol (SCAP) Community developed Machine readable XML Reporting Representing security checklists Detecting machine state – Community developed – Product names – Vulnerabilities – Configuration settings Languages Means of providing instructions Enumerations Convention for identifying and naming Metrics Risk scoring framework Community developed Transparent Metrics Base Temporal Environmental

Business Systems Vulnerability Checks Infrastructure FixesAssetsEvent LanguagePatterns Sharable Policy System Characteristics Standard Names & Reference Conventions ControlsPolicy Reporting Layer and Data Interface WeaknessesThreats Lessons Learned Attack Patterns Technical Alerts & Signatures Bulletins and Advisories Situational Awareness Continuous Monitoring Automated Compliance Mgmt Notional Security Data Model

Reportable IT Systems OVALOCIL Inventoried, Trusted Connections OVRLAssetsEvent LanguagePatterns XCCDF System Characteristics ControlsPolicy Reporting Layer and Data Interface (TBD, e.g. XBRL, etc) TBDSignatures CAPEC Technical Bulletins Bulletins and Advisories Situational Awareness Continuous Monitoring Automated Compliance Mgmt TBD CRE CEE CERE CCECVECRETBD CCICCSSCPETBD Specifications-Based Security Automation

Security Automation Partners and Resources

Partners US Government – National Institute of Standards and Technology (NIST) – National Security Agency (NSA) – Department of Homeland Security (DHS) – Defense Information Systems Agency (DISA) Foreign Government – Japan - JVN/IPA - Japan Vulnerability Notes / Information Technology Promotion Agency – Spain – INTECO - Instituto Nacional de Tecnologías de la Comunicación Private Sector – Apple, Microsoft, Red Hat, Sun Microsystems – Security product vendors

National Vulnerability Database NVD is the U.S. government repository of public vulnerability management information. Provides standardized reference for software vulnerabilities. Over 39,000 CVE entries with the NVD Analysis Team evaluating over 6,000 vulnerabilities a year Product dictionary containing 18,000 unique product names Used by government, industry and academia Machine-readable data feeds Spanish and Japanese language translation

National Checklist Program U.S. Government repository of publicly available security checklists Eases compliance management Checklists cover 178 products SCAP content Checklist contributors include Government organizations Vendors Non-profit organizations Part 39 of the Federal Acquisition Regulation (FAR)

Content Tools eSCAPe Creation of new and/or customized configuration policies Puts the power of SCAP into the hands of existing staff; reduces cost/barrier of entry Government wide, department level, or agency specific Quickly generate specific assessment criteria for vulnerabilities or presence of malware Pushed out to SCAP enabled products Content Validation Ensures all content published to NCP is formatted correctly

SCAP Validation Program Provides product conformance testing for Security Content Automation Protocol (SCAP) National Voluntary Laboratory Accreditation Program – Independent testing laboratories – Reports validated by NIST (Validation Program) (Validated Products)

NIST SCAP Product Validation Program

Looking Ahead Remediation capabilities – Rapidly deploy corrective action Shutting down services, locking out accounts, etc… Network Event Management – Event Management Automation Protocol (EMAP)

Conclusion Security Automation: Improves efficiency Promotes interoperability of data and security tools Enables standardized reporting across multiple views Provides enhanced situational awareness